Identity confidentiality method in radio communication system
First Claim
1. An identity confidentiality method in a radio communication system having at least one first radio station and a plurality of second radio stations, said first radio station at least possessing a public key, a public-key cryptography function which uses the public key and a plurality of identities of the respective second radio stations, each of said second radio stations possessing a public-key cryptography function which uses the public key and an identity for identifying the second radio station, said method comprising the steps of:
- generating a time-varying public key in accordance with a predetermined function at said first radio station;
repeatedly broadcasting, from said first radio station, the generated time-varying public key to all said second radio stations;
enciphering an identity of each second radio station, at each said second radio station, with the broadcasted time-varying public key;
at each second radio station, after enciphering its identity with the broadcasted time-varying public key, waiting for a possible call thereto; and
at the first radio station, enciphering the identity corresponding to a second radio station to be called with the time-varying public key and paging the enciphered identity to all the second radio stations.
4 Assignments
0 Petitions
Accused Products
Abstract
The radio communication system has at least one first radio station such as a base station and a plurality of second radio stations such as mobile stations. The base station at least possesses a public key, and each of the mobile stations possesses a public-key cryptography function for using the public key and an identity itself. An identity confidentiality method includes steps of generating a time-varying public key at the base station based upon a predetermined time initial, and repeatedly broadcasting, from the base station, the generated time-varying public key to all the mobile stations. The mobile stations cipher their respective identities with the broadcasted time-varying public key so that the encrypted/identities of the mobile stations, which are sent to the base station, remain confidential. After enciphering their identity, the mobile stations wait to be called. When a mobile station is to be called, the base station enciphers the mobile station'"'"'s identity with the time-varying public key and pages the enciphered identity to all mobile stations.
-
Citations
13 Claims
-
1. An identity confidentiality method in a radio communication system having at least one first radio station and a plurality of second radio stations, said first radio station at least possessing a public key, a public-key cryptography function which uses the public key and a plurality of identities of the respective second radio stations, each of said second radio stations possessing a public-key cryptography function which uses the public key and an identity for identifying the second radio station, said method comprising the steps of:
-
generating a time-varying public key in accordance with a predetermined function at said first radio station; repeatedly broadcasting, from said first radio station, the generated time-varying public key to all said second radio stations; enciphering an identity of each second radio station, at each said second radio station, with the broadcasted time-varying public key; at each second radio station, after enciphering its identity with the broadcasted time-varying public key, waiting for a possible call thereto; and at the first radio station, enciphering the identity corresponding to a second radio station to be called with the time-varying public key and paging the enciphered identity to all the second radio stations. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. An identity confidentiality method in a radio communication system having at least one first radio station and a plurality of second radio stations, said first radio station possessing a public key, a private key corresponding to the public key, a public-key cryptography function for deciphering an enciphered identity of the respective second radio stations with the private key and a plurality of identities of the respective second radio stations, each of said second radio stations possessing a public-key cryptography function which uses the public key and possessing an identity for identifying the second radio station, said method comprising the steps of:
-
generating a time-varying public key in accordance with a predetermined function at said first radio station; repeatedly broadcasting, from said first radio station, the generated time-varying public key to all said second radio stations; enciphering, at one of the second radio stations, the identity of the second station with the broadcasted time-varying public key and sending the enciphered identity to the first radio station; receiving at the first radio station the enciphered identity sent from the second radio station and deciphering the received enciphered identity with the private key to extract the identity of the second radio station; at each second radio station, after enciphering its identity with the broadcasted time-varying public key, waiting for a possible call thereto; and at the first radio station, enciphering the identity corresponding to a second radio station to be called with the time-varying public key and paging the enciphered identity to all the second radio stations. - View Dependent Claims (8, 9, 10, 11)
-
-
12. An identity confidentiality method in a radio communication system having at least one first radio station and a plurality of second radio stations, said first radio station possessing a one-way function fK with a time-varying parameter k wherein for every x in a domain of fK, fK (X) is easy to compute but for virtually all y in a range of f, it is computational infeasible to find an x such that y=fK (x), said one-way function being capable of using a time-varying parameter, each of said second radio stations possessing the same one-way function and possessing an identity for identifying the second radio station, said method comprising the steps of:
-
generating a time-varying parameter in accordance with a predetermined function at said first radio station; repeatedly broadcasting, from said first radio station, the generated time-varying parameter to all said second radio stations; enciphering an identity of each second radio station at each said second radio station, with the broadcasted time-varying parameter; transferring, at each second radio station, its identity using said one-way function and waiting for a possible call thereto; transferring, at the first radio station, the identity corresponding to a second radio station to be called using said one-way function; and paging the transferred identity to all the second radio stations. - View Dependent Claims (13)
-
Specification